1 // carddav-serveretag.cpp - CardDAV Object - Server ETag subroutines.
3 // (c) 2012-2015 Xestia Software Development.
5 // This file is part of Xestia Address Book.
7 // Xestia Address Book is free software: you can redistribute it and/or modify
8 // it under the terms of the GNU General Public License as published by the
9 // Free Software Foundation, version 3 of the license.
11 // Xestia Address Book is distributed in the hope that it will be useful,
12 // but WITHOUT ANY WARRANTY; without even the implied warranty of
13 // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 // GNU General Public License for more details.
16 // You should have received a copy of the GNU General Public License along
17 // with Xestia Address Book. If not, see <http://www.gnu.org/licenses/>
20 #include "../version.h"
22 #include <wx/tokenzr.h>
24 #include <libxml/parser.h>
25 #include <libxml/tree.h>
28 #include "../vcard/vcard.h"
29 #include "../common/dirs.h"
31 void CardDAV::GetServerETagValueThread()
34 // Get the server etag value (threaded).
41 AbortConnection = FALSE;
43 bool FilenameIsDirectory = FALSE;
46 wxString ServerAddressURL;
48 wxString ServerAddressSSL;
49 wxString ServerAddressNormal;
51 conn = curl_easy_init();
53 SetConnectionObject(conn);
55 struct CardDAVCURLPasser {
58 bool HeaderMode = TRUE;
60 } CardDAVHeader, CardDAVFooter;
62 CardDAVHeader.Data = this;
63 CardDAVHeader.HeaderMode = TRUE;
65 CardDAVFooter.Data = this;
66 CardDAVFooter.HeaderMode = FALSE;
71 ServerAddressURL = ServerAddress + wxT(":") + wxString::Format(wxT("%i"), ServerPort) + ServerPrefix + ServerFilenameLocation;
72 ServerAddressSSL = wxT("https://") + ServerAddressURL;
73 ServerAddressNormal = wxT("http://") + ServerAddressURL;
75 ServerAuth = ServerUser + wxT(":") + ServerPass;
77 std::map<int,int>::iterator ActIter;
78 struct UploadDataStruc UploadData;
81 ActIter = ActivityListPtr->find((int)ItemIndex);
83 static const char* query =
84 "<?xml version=\"1.0\" encoding=\"utf-8\" ?>"
85 "<C:addressbook-query xmlns:D=\"DAV:\""
86 " xmlns:C=\"urn:ietf:params:xml:ns:carddav\">"
87 "<D:prop><D:getetag/>"
90 "</C:addressbook-query>";
94 wxString ServerCertFilename;
95 bool MatchingCert = FALSE;
97 curl_easy_setopt(conn, CURLOPT_URL, (const char*)ServerAddressSSL.mb_str(wxConvUTF8));
98 curl_easy_setopt(conn, CURLOPT_NOPROGRESS, 0);
99 curl_easy_setopt(conn, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
100 curl_easy_setopt(conn, CURLOPT_TIMEOUT, 60);
101 curl_easy_setopt(conn, CURLOPT_FAILONERROR, TRUE);
102 curl_easy_setopt(conn, CURLOPT_USERAGENT, XSDAB_USERAGENT);
103 curl_easy_setopt(conn, CURLOPT_USERPWD, (const char*)ServerAuth.mb_str(wxConvUTF8));
104 curl_easy_setopt(conn, CURLOPT_WRITEFUNCTION, WritebackFunc);
105 curl_easy_setopt(conn, CURLOPT_WRITEDATA, &PageData);
106 curl_easy_setopt(conn, CURLOPT_WRITEHEADER, &PageHeader);
107 curl_easy_setopt(conn, CURLOPT_PROGRESSDATA, this);
108 curl_easy_setopt(conn, CURLOPT_PROGRESSFUNCTION, ProgressFunc);
109 curl_easy_setopt(conn, CURLOPT_CUSTOMREQUEST, "REPORT");
110 curl_easy_setopt(conn, CURLOPT_NOSIGNAL, 1);
111 curl_easy_setopt(conn, CURLOPT_POSTFIELDS, query);
112 curl_easy_setopt(conn, CURLOPT_POSTFIELDSIZE, strlen(query));
114 #if defined(__APPLE__)
118 ServerCertFilename = GetAccountDir(ServerAccount, TRUE);
120 if (wxFile::Exists(ServerCertFilename) == TRUE){
122 curl_easy_setopt(conn, CURLOPT_SSL_VERIFYPEER, 1);
123 curl_easy_setopt(conn, CURLOPT_SSL_VERIFYHOST, 2);
124 curl_easy_setopt(conn, CURLOPT_CAINFO, (const char*)ServerCertFilename.mb_str(wxConvUTF8));
130 claconncode = (curl_easy_perform(conn));
132 // If CURLE_PEER_FAILED_VERIFICATION is returned, retry without
133 // the local certificate in use.
135 if (claconncode == CURLE_PEER_FAILED_VERIFICATION){
137 curl_easy_cleanup(conn);
138 conn = curl_easy_init();
140 curl_easy_setopt(conn, CURLOPT_URL, (const char*)ServerAddressSSL.mb_str(wxConvUTF8));
141 curl_easy_setopt(conn, CURLOPT_NOPROGRESS, 0);
142 curl_easy_setopt(conn, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
143 curl_easy_setopt(conn, CURLOPT_TIMEOUT, 60);
144 curl_easy_setopt(conn, CURLOPT_FAILONERROR, TRUE);
145 curl_easy_setopt(conn, CURLOPT_USERAGENT, XSDAB_USERAGENT);
146 curl_easy_setopt(conn, CURLOPT_USERPWD, (const char*)ServerAuth.mb_str(wxConvUTF8));
147 curl_easy_setopt(conn, CURLOPT_WRITEFUNCTION, WritebackFunc);
148 curl_easy_setopt(conn, CURLOPT_WRITEDATA, &PageData);
149 curl_easy_setopt(conn, CURLOPT_WRITEHEADER, &PageHeader);
150 curl_easy_setopt(conn, CURLOPT_PROGRESSDATA, this);
151 curl_easy_setopt(conn, CURLOPT_PROGRESSFUNCTION, ProgressFunc);
152 curl_easy_setopt(conn, CURLOPT_CUSTOMREQUEST, "REPORT");
153 curl_easy_setopt(conn, CURLOPT_NOSIGNAL, 1);
154 curl_easy_setopt(conn, CURLOPT_POSTFIELDS, query);
155 curl_easy_setopt(conn, CURLOPT_POSTFIELDSIZE, strlen(query));
157 claconncode = (curl_easy_perform(conn));
159 // If claconncode is CURLE_OK then delete the certificate file as that
160 // is no longer needed.
162 if (claconncode == CURLE_OK){
164 // Delete the certificate file.
166 wxRemoveFile(ServerCertFilename);
172 // Check if it fails with a CURLE_SSL_CACERT then compare
173 // the certificates as PEM files.
175 #if defined(__APPLE__)
179 if (claconncode == CURLE_SSL_CACERT && wxFile::Exists(ServerCertFilename) == TRUE){
182 sslerrconn = curl_easy_init();
183 CURLcode sslerrconncode;
185 wxString ServerAddressOnly = wxT("https://") + ServerAddress + wxT(":") + wxString::Format(wxT("%i"), ServerPort) + wxT("/");
190 curl_easy_setopt(sslerrconn, CURLOPT_URL, (const char*)ServerAddressOnly.mb_str(wxConvUTF8));
191 curl_easy_setopt(sslerrconn, CURLOPT_NOPROGRESS, 0);
192 curl_easy_setopt(sslerrconn, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
193 curl_easy_setopt(sslerrconn, CURLOPT_TIMEOUT, 60);
194 curl_easy_setopt(sslerrconn, CURLOPT_FAILONERROR, TRUE);
195 curl_easy_setopt(sslerrconn, CURLOPT_USERAGENT, XSDAB_USERAGENT);
196 curl_easy_setopt(sslerrconn, CURLOPT_WRITEFUNCTION, WritebackFunc);
197 curl_easy_setopt(sslerrconn, CURLOPT_WRITEDATA, &PageData);
198 curl_easy_setopt(sslerrconn, CURLOPT_WRITEHEADER, &PageHeader);
199 curl_easy_setopt(sslerrconn, CURLOPT_PROGRESSDATA, this);
200 curl_easy_setopt(sslerrconn, CURLOPT_PROGRESSFUNCTION, ProgressFunc);
201 curl_easy_setopt(sslerrconn, CURLOPT_NOSIGNAL, 1);
202 curl_easy_setopt(sslerrconn, CURLOPT_SSL_VERIFYPEER, 0);
203 curl_easy_setopt(sslerrconn, CURLOPT_CERTINFO, 1);
204 curl_easy_setopt(sslerrconn, CURLOPT_SSL_VERIFYPEER, 1);
205 curl_easy_setopt(sslerrconn, CURLOPT_SSL_VERIFYHOST, 2);
206 curl_easy_setopt(sslerrconn, CURLOPT_CAINFO, (const char*)ServerCertFilename.mb_str(wxConvUTF8));
208 wxString SSLLocalData;
209 wxString SSLServerData;
211 sslerrconncode = (curl_easy_perform(sslerrconn));
213 SSLCertCol = BuildSSLCollection(sslerrconn);
214 std::map<int, SSLCertData>::iterator SSLCDIter = SSLCertCol.SSLCollection.find(0);
215 std::multimap<wxString,wxString>::iterator SSLDataIter = SSLCDIter->second.CertData.find(wxT("Cert"));
217 wxFFile SSLLocalFile;
219 #if wxABI_VERSION < 20900
220 SSLLocalFile.Open(ServerCertFilename.c_str(), wxT("r"));
222 SSLLocalFile.Open(ServerCertFilename, wxT("r"));
225 // Load the recovery database for tasks not done.
227 if (SSLLocalFile.IsOpened() == TRUE){
229 // Check if we are using wxWidgets version 2.8 or less and
230 // execute the required command accordingly.
232 SSLLocalFile.ReadAll(&SSLLocalData, wxConvAuto());
237 SSLServerData = SSLDataIter->second;
239 if (SSLLocalData == SSLServerData){
241 // Server key matches with local key so retry with CURLOPT_SSL_VERIFYPEER
242 // and CURLOPT_SSL_VERIFYHOST off.
244 curl_easy_cleanup(conn);
245 conn = curl_easy_init();
250 curl_easy_setopt(conn, CURLOPT_URL, (const char*)ServerAddressSSL.mb_str(wxConvUTF8));
251 curl_easy_setopt(conn, CURLOPT_NOPROGRESS, 0);
252 curl_easy_setopt(conn, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
253 curl_easy_setopt(conn, CURLOPT_TIMEOUT, 60);
254 curl_easy_setopt(conn, CURLOPT_FAILONERROR, TRUE);
255 curl_easy_setopt(conn, CURLOPT_USERAGENT, XSDAB_USERAGENT);
256 curl_easy_setopt(conn, CURLOPT_USERPWD, (const char*)ServerAuth.mb_str(wxConvUTF8));
257 curl_easy_setopt(conn, CURLOPT_WRITEFUNCTION, WritebackFunc);
258 curl_easy_setopt(conn, CURLOPT_WRITEDATA, &PageData);
259 curl_easy_setopt(conn, CURLOPT_WRITEHEADER, &PageHeader);
260 curl_easy_setopt(conn, CURLOPT_PROGRESSDATA, this);
261 curl_easy_setopt(conn, CURLOPT_PROGRESSFUNCTION, ProgressFunc);
262 curl_easy_setopt(conn, CURLOPT_CUSTOMREQUEST, "REPORT");
263 curl_easy_setopt(conn, CURLOPT_NOSIGNAL, 1);
264 curl_easy_setopt(conn, CURLOPT_POSTFIELDS, query);
265 curl_easy_setopt(conn, CURLOPT_POSTFIELDSIZE, strlen(query));
266 curl_easy_setopt(conn, CURLOPT_SSL_VERIFYPEER, 0);
267 curl_easy_setopt(conn, CURLOPT_SSL_VERIFYHOST, 0);
269 claconncode = (curl_easy_perform(conn));
275 if (MatchingCert == FALSE){
277 claconncode = CURLE_SSL_CACERT;
282 curl_easy_cleanup(sslerrconn);
288 // Sort out SSL error.
290 // When SSL cert error occurs, connect again and fetch certificates.
291 // Display a message to the user explaining that an invalid
292 // certificate has been given and let the user decide what
295 if (claconncode == CURLE_OK){
297 } else if (claconncode == CURLE_SSL_CACERT || claconncode == CURLE_PEER_FAILED_VERIFICATION){
300 sslerrconn = curl_easy_init();
301 CURLcode sslerrconncode;
303 wxString ServerAddressOnly = wxT("https://") + ServerAddress + wxT(":") + wxString::Format(wxT("%i"), ServerPort) + wxT("/");
305 // Replace conn with sslerrconn!
307 curl_easy_setopt(sslerrconn, CURLOPT_URL, (const char*)ServerAddressOnly.mb_str(wxConvUTF8));
308 curl_easy_setopt(sslerrconn, CURLOPT_NOPROGRESS, 0);
309 curl_easy_setopt(sslerrconn, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
310 curl_easy_setopt(sslerrconn, CURLOPT_TIMEOUT, 60);
311 curl_easy_setopt(sslerrconn, CURLOPT_FAILONERROR, TRUE);
312 curl_easy_setopt(sslerrconn, CURLOPT_USERAGENT, XSDAB_USERAGENT);
313 curl_easy_setopt(sslerrconn, CURLOPT_WRITEFUNCTION, WritebackFunc);
314 curl_easy_setopt(sslerrconn, CURLOPT_WRITEDATA, &PageData);
315 curl_easy_setopt(sslerrconn, CURLOPT_WRITEHEADER, &PageHeader);
316 curl_easy_setopt(sslerrconn, CURLOPT_PROGRESSDATA, this);
317 curl_easy_setopt(sslerrconn, CURLOPT_PROGRESSFUNCTION, ProgressFunc);
318 curl_easy_setopt(sslerrconn, CURLOPT_NOSIGNAL, 1);
319 curl_easy_setopt(sslerrconn, CURLOPT_SSL_VERIFYPEER, 0);
320 curl_easy_setopt(sslerrconn, CURLOPT_CERTINFO, 1);
322 sslerrconncode = (curl_easy_perform(sslerrconn));
324 SetConnectionObject(sslerrconn);
326 SSLCertCol = BuildSSLCollection(sslerrconn);
327 SSLCertCol.SuccessCode = 1;
329 curl_easy_cleanup(conn);
330 curl_easy_cleanup(sslerrconn);
334 } else if (claconncode == CURLE_HTTP_RETURNED_ERROR){
336 fprintf(stderr, "GetServerETagValueThread(): curl_easy_perform() failed: %s\n",
337 curl_easy_strerror(claconncode));
339 curl_easy_getinfo(conn, CURLINFO_RESPONSE_CODE, &http_code);
340 fprintf(stderr, "Error code was: %d\n", http_code);
342 curl_easy_cleanup(conn);
348 fprintf(stderr, "GetServerETagValueThread(): curl_easy_perform() failed: %s\n",
349 curl_easy_strerror(claconncode));
351 curl_easy_getinfo(conn, CURLINFO_RESPONSE_CODE, &http_code);
352 fprintf(stderr, "Error code was: %d\n", http_code);
354 curl_easy_cleanup(conn);
364 wxString EmptyString;
366 curl_easy_setopt(conn, CURLOPT_URL, (const char*)ServerAddressNormal.mb_str(wxConvUTF8));
367 curl_easy_setopt(conn, CURLOPT_NOPROGRESS, 0);
368 curl_easy_setopt(conn, CURLOPT_HTTPAUTH, CURLAUTH_ANY);
369 curl_easy_setopt(conn, CURLOPT_TIMEOUT, 60);
370 curl_easy_setopt(conn, CURLOPT_FAILONERROR, TRUE);
371 curl_easy_setopt(conn, CURLOPT_USERAGENT, XSDAB_USERAGENT);
372 curl_easy_setopt(conn, CURLOPT_USERPWD, (const char*)ServerAuth.mb_str(wxConvUTF8));
373 curl_easy_setopt(conn, CURLOPT_WRITEFUNCTION, WritebackFunc);
374 curl_easy_setopt(conn, CURLOPT_WRITEDATA, &PageData);
375 curl_easy_setopt(conn, CURLOPT_WRITEHEADER, &PageHeader);
376 curl_easy_setopt(conn, CURLOPT_PROGRESSDATA, this);
377 curl_easy_setopt(conn, CURLOPT_PROGRESSFUNCTION, ProgressFunc);
378 curl_easy_setopt(conn, CURLOPT_CUSTOMREQUEST, "REPORT");
379 curl_easy_setopt(conn, CURLOPT_NOSIGNAL, 1);
380 curl_easy_setopt(conn, CURLOPT_POSTFIELDS, query);
381 curl_easy_setopt(conn, CURLOPT_POSTFIELDSIZE, strlen(query));
386 conncode = (curl_easy_perform(conn));
388 if (conncode == CURLE_OK){
390 } else if (conncode == CURLE_HTTP_RETURNED_ERROR){
392 fprintf(stderr, "curl_easy_perform() failed: %s\n",
393 curl_easy_strerror(conncode));
399 fprintf(stderr, "curl_easy_perform() failed: %s\n",
400 curl_easy_strerror(conncode));
408 xmlDocPtr xmlCardDAVDoc;
410 xmlCardDAVDoc = xmlReadMemory(PageData.mb_str(wxConvUTF8), (int)PageData.Len(), "noname.xml", NULL, 0);
412 xmlNodePtr nodeLevel1;
413 xmlNodePtr nodeLevel2;
414 xmlNodePtr nodeLevel3;
415 xmlNodePtr nodeLevel4;
416 xmlNodePtr nodeLevel5;
417 xmlNodePtr nodeLevel6;
419 std::map<wxString,wxString> xmlDataMap;
421 wxString DataFilename;
424 std::string xmlStringSafe;
426 // Tranverse through the catacombs of the response to get our ETag for the file.
428 for (nodeLevel1 = xmlCardDAVDoc->children;
430 nodeLevel1 = nodeLevel1->next)
433 bool HREFFound = FALSE;
434 bool ETagFound = FALSE;
436 for (nodeLevel2 = nodeLevel1->children;
438 nodeLevel2 = nodeLevel2->next)
441 for (nodeLevel3 = nodeLevel2->children;
443 nodeLevel3 = nodeLevel3->next)
446 if (!xmlStrcmp(nodeLevel3->name, (const xmlChar *)"href") ||
447 !xmlStrcmp(nodeLevel3->name, (const xmlChar *)"d:href") ||
448 !xmlStrcmp(nodeLevel3->name, (const xmlChar *)"D:href")
453 for (nodeLevel4 = nodeLevel3->children;
455 nodeLevel4 = nodeLevel4->next)
458 if (!xmlStrcmp(nodeLevel4->name, (const xmlChar *)"text") ||
459 !xmlStrcmp(nodeLevel4->name, (const xmlChar *)"d:text") ||
460 !xmlStrcmp(nodeLevel4->name, (const xmlChar *)"D:text")
463 DataFilename = wxString::FromUTF8((const char*)nodeLevel4->content);
464 wxStringTokenizer wSTDFilename(DataFilename, wxT("/"));
466 while (wSTDFilename.HasMoreTokens()){
468 DataFilename = wSTDFilename.GetNextToken();
482 for (nodeLevel4 = nodeLevel3->children;
484 nodeLevel4 = nodeLevel4->next)
487 for (nodeLevel5 = nodeLevel4->children;
489 nodeLevel5 = nodeLevel5->next)
492 if (!xmlStrcmp(nodeLevel5->name, (const xmlChar *)"getetag") ||
493 !xmlStrcmp(nodeLevel5->name, (const xmlChar *)"d:getetag") ||
494 !xmlStrcmp(nodeLevel5->name, (const xmlChar *)"D:getetag")
497 for (nodeLevel6 = nodeLevel5->children;
499 nodeLevel6 = nodeLevel6->next)
502 // Strip the quotes from the ETag.
504 ETagData = wxString::FromUTF8((const char*)nodeLevel6->content);
505 if (ETagData.Mid(0, 1) == wxT("\"") && ETagData.Mid((ETagData.Len() - 1), 1) == wxT("\"")){
507 ETagData.Remove(0, 1);
508 ETagData.RemoveLast();
528 if (HREFFound == TRUE && ETagFound == TRUE){
530 // Add to the map data.
532 xmlDataMap.insert(std::make_pair(DataFilename, ETagData));
542 xmlFreeDoc(xmlCardDAVDoc);
544 // Get the first result.
546 for (std::map<wxString,wxString>::iterator iter = xmlDataMap.begin();
547 iter != xmlDataMap.end(); ++iter){
549 ETagResult = iter->second;
554 if (ETagResult.IsEmpty()){
564 void CardDAV::GetServerETagValue(){
566 // Get the server etag value.
568 std::thread ConnectThread(&CardDAV::GetServerETagValueThread, this);
569 ConnectThread.detach();